{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:25:18Z","timestamp":1774365918893,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1702879"],"award-info":[{"award-number":["CNS-1702879"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196545","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"89-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["2MA"],"prefix":"10.1145","author":[{"given":"Logan","family":"Blue","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Hadi","family":"Abdullah","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Luis","family":"Vargas","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Music Angel JH-MD5BT Bluetooth Speaker. https:\/\/www.amazon.com\/ imiss-music-angel-jhmd05bt-mini-bluetooth-wireless-portable-speaker\/dp\/ B00F86RRNY\/?tag=napcardnao-20. ({n. d.}). 2017--12--18.  {n. d.}. Music Angel JH-MD5BT Bluetooth Speaker. https:\/\/www.amazon.com\/ imiss-music-angel-jhmd05bt-mini-bluetooth-wireless-portable-speaker\/dp\/ B00F86RRNY\/?tag=napcardnao-20. ({n. d.}). 2017--12--18."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. TIMIT: Acoustic-Phonetic Continuous Speech Corpus. https:\/\/ catalog.ldc.upenn.edu\/ldc93s1. ({n. d.}). 2017--12--18.  {n. d.}. TIMIT: Acoustic-Phonetic Continuous Speech Corpus. https:\/\/ catalog.ldc.upenn.edu\/ldc93s1. ({n. d.}). 2017--12--18."},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. TV anchor says live on-air 'Alexa order me a dollhouse' guess what happens next. ({n. d.}).  {n. d.}. TV anchor says live on-air 'Alexa order me a dollhouse' guess what happens next. ({n. d.})."},{"key":"e_1_3_2_1_4_1","unstructured":"2010. Network Time Protocol Version 4: Protocol and Algorithms Specification. https:\/\/tools.ietf.org\/html\/rfc5905. (2010).  2010. Network Time Protocol Version 4: Protocol and Algorithms Specification. https:\/\/tools.ietf.org\/html\/rfc5905. (2010)."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. Adobe demos \"photoshop for audio \" lets you edit speech as easily as text. https:\/\/arstechnica.com\/information-technology\/2016\/11\/adobe-vocophotoshop-for-audio-speech-editing\/. (2017).  2017. Adobe demos \"photoshop for audio \" lets you edit speech as easily as text. https:\/\/arstechnica.com\/information-technology\/2016\/11\/adobe-vocophotoshop-for-audio-speech-editing\/. (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Amazon Alexa Line. https:\/\/www.amazon.com\/Amazon-Echo-And-AlexaDevices\/b?ie=UTF8&node=9818047011. (2017).  2017. Amazon Alexa Line. https:\/\/www.amazon.com\/Amazon-Echo-And-AlexaDevices\/b?ie=UTF8&node=9818047011. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Apple Siri. https:\/\/www.apple.com\/ios\/siri\/. (2017).  2017. Apple Siri. https:\/\/www.apple.com\/ios\/siri\/. (2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"2017. August Home Supports the Google Assistant. http:\/\/august.com\/2017\/03\/ 28\/google-assistant\/. (2017).  2017. August Home Supports the Google Assistant. http:\/\/august.com\/2017\/03\/ 28\/google-assistant\/. (2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"2017. Burger King 'O.K. Google' Ad Doesn't Seem O.K. With Google. https:\/\/www.nytimes.com\/2017\/04\/12\/business\/burger-king-tv-ad-googlehome.html. (2017).  2017. Burger King 'O.K. Google' Ad Doesn't Seem O.K. With Google. https:\/\/www.nytimes.com\/2017\/04\/12\/business\/burger-king-tv-ad-googlehome.html. (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"2017. Cortana. https:\/\/www.microsoft.com\/en-us\/windows\/cortana. (2017).  2017. Cortana. https:\/\/www.microsoft.com\/en-us\/windows\/cortana. (2017)."},{"key":"e_1_3_2_1_11_1","unstructured":"2017. Google Assistant. https:\/\/assistant.google.com\/. (2017).  2017. Google Assistant. https:\/\/assistant.google.com\/. (2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"2017. Google Home. https:\/\/madeby.google.com\/home\/. (2017).  2017. Google Home. https:\/\/madeby.google.com\/home\/. (2017)."},{"key":"e_1_3_2_1_13_1","unstructured":"2017. Google Home now lets you shop by voice just like Amazon's Alexa. https:\/\/techcrunch.com\/2017\/02\/16\/google-home-now-lets-you-shopby-voice-just-like-amazons-alexa\/. (2017).  2017. Google Home now lets you shop by voice just like Amazon's Alexa. https:\/\/techcrunch.com\/2017\/02\/16\/google-home-now-lets-you-shopby-voice-just-like-amazons-alexa\/. (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"2017. LyreBird. https:\/\/github.com\/logant\/Lyrebird. (2017).  2017. LyreBird. https:\/\/github.com\/logant\/Lyrebird. (2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"2017. Starling Bank Integrates API into Google Home. http:\/\/bankinnovation.net\/ 2017\/02\/starling-bank-integrates-api-into-google-home-video\/. (2017).  2017. Starling Bank Integrates API into Google Home. http:\/\/bankinnovation.net\/ 2017\/02\/starling-bank-integrates-api-into-google-home-video\/. (2017)."},{"key":"e_1_3_2_1_16_1","unstructured":"2017. Walmart Makes Voice Shopping Even More Affordable with New Google Device. https:\/\/blog.walmart.com\/innovation\/20171004\/walmart-makes-voiceshopping-even-more-affordable-with-new-google-device. (2017).  2017. Walmart Makes Voice Shopping Even More Affordable with New Google Device. https:\/\/blog.walmart.com\/innovation\/20171004\/walmart-makes-voiceshopping-even-more-affordable-with-new-google-device. (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"Information Fusion in Biometrics","author":"Jain Salil Prabhakar","year":"2004","unstructured":"Salil Prabhakar Antil K. Jain , Arun Ross . 2004. Information Fusion in Biometrics . IEEE Transactions on Circuits and Systems for Video Technology ( 2004 ). Salil Prabhakar Antil K. Jain, Arun Ross. 2004. Information Fusion in Biometrics. IEEE Transactions on Circuits and Systems for Video Technology (2004)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks.","author":"Meadows C.","unstructured":"C. Meadows , P. Syverson , and L. Chang . 2013. Towards more efficient distance bounding protocols for use in sensor networks . Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks. C. Meadows, P. Syverson, and L. Chang. 2013. Towards more efficient distance bounding protocols for use in sensor networks. Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks."},{"key":"e_1_3_2_1_20_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium.","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In 25th USENIX Security Symposium. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570647"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844143"},{"key":"e_1_3_2_1_23_1","volume-title":"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS).","author":"Francillon Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Francillon , Boris Danev , and Srdjan Capkun . 2011 . Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_24_1","volume-title":"Distributed systems: an algorithmic approach","author":"Ghosh Sukumar","unstructured":"Sukumar Ghosh . 2014. Distributed systems: an algorithmic approach . CRC press . Sukumar Ghosh. 2014. Distributed systems: an algorithmic approach. CRC press."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. 2017. Transactions Developer Preview. https:\/\/developers.google.com\/ actions\/transactions\/. (2017).  Google. 2017. Transactions Developer Preview. https:\/\/developers.google.com\/ actions\/transactions\/. (2017)."},{"key":"e_1_3_2_1_26_1","volume-title":"Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data","author":"Halevi Tzipora","unstructured":"Tzipora Halevi , Di Ma , Nitesh Saxena , and Tuo Xiang . 2012. Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data . Springer Berlin Heidelberg , Berlin, Heidelberg . Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang. 2012. Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. Springer Berlin Heidelberg, Berlin, Heidelberg."},{"key":"e_1_3_2_1_27_1","volume-title":"Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. arXiv preprint arXiv:1505.05779","author":"Huhta Otto","year":"2015","unstructured":"Otto Huhta , Prakash Shrestha , Swapnil Udar , Mika Juuti , Nitesh Saxena , and N Asokan . 2015. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. arXiv preprint arXiv:1505.05779 ( 2015 ). Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, and N Asokan. 2015. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. arXiv preprint arXiv:1505.05779 (2015)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_9"},{"key":"e_1_3_2_1_29_1","volume-title":"Robust Speech Hashing for Content Authentication","author":"Jiao Yuhua","year":"2009","unstructured":"Yuhua Jiao , Liping Ji , and Xiamu Niu . 2009. Robust Speech Hashing for Content Authentication . IEEE Signal Processing Letters ( 2009 ). Yuhua Jiao, Liping Ji, and Xiamu Niu. 2009. Robust Speech Hashing for Content Authentication. IEEE Signal Processing Letters (2009)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 24th USENIX Security Symposium.","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos , Claudio Marforio , Claudio Soriente , and Srfjan Capkun . 2015 . Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound . Proceedings of the 24th USENIX Security Symposium. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srfjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. Proceedings of the 24th USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"e_1_3_2_1_32_1","volume-title":"DDoS in the IoT: Mirai and other botnets","author":"Kolias Constantinos","year":"2017","unstructured":"Constantinos Kolias , Georgios Kambourakis , Angelos Stavrou , and Jeffrey Voas . 2017. DDoS in the IoT: Mirai and other botnets . IEEE Computer Society ( 2017 ). Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. IEEE Computer Society (2017)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.51"},{"key":"e_1_3_2_1_34_1","volume-title":"Nature's music: the science of birdsong","author":"Marler Peter R","unstructured":"Peter R Marler and Hans Slabbekoorn . 2004. Nature's music: the science of birdsong . Academic Press . Peter R Marler and Hans Slabbekoorn. 2004. Nature's music: the science of birdsong. Academic Press."},{"key":"e_1_3_2_1_35_1","unstructured":"Chase Martin. 2017. 72% Want Voice Control In Smart-Home Products. Media Post -- https:\/\/www.mediapost.com\/publications\/article\/292253\/72-want-voicecontrol-in-smart-home-products.html?edition=99353. (2017).  Chase Martin. 2017. 72% Want Voice Control In Smart-Home Products. Media Post -- https:\/\/www.mediapost.com\/publications\/article\/292253\/72-want-voicecontrol-in-smart-home-products.html?edition=99353. (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_37_1","unstructured":"National Institute of Standards and Technology. 2012. Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication 800- 107 - Revision 1. (2012).  National Institute of Standards and Technology. 2012. Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication 800- 107 - Revision 1. (2012)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766504"},{"key":"e_1_3_2_1_40_1","volume-title":"AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Reaves Bradley","year":"2017","unstructured":"Bradley Reaves , Logan Blue , Hadi Abdullah , Luis Vargas , Patrick Traynor , and Thomas Shrimpton . 2017 . AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17) . Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, and Thomas Shrimpton. 2017. AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660274"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978328"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_3_2_1_44_1","volume-title":"Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. 11th USENIX Workshop on Offensive Technologies","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. 11th USENIX Workshop on Offensive Technologies (2015). Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. 11th USENIX Workshop on Offensive Technologies (2015)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196545","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196545"}},"subtitle":["Verifying Voice Commands via Two Microphone Authentication"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":45,"alternative-id":["10.1145\/3196494.3196545","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196545","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}